Fri.Jan 24, 2025

article thumbnail

J-magic malware campaign targets Juniper routers

Security Affairs

Threat actors are targeting Juniper routers with a custom backdoor in a campaign called code-named “J-magic,” attackers are exploiting a Magic Packet flaw. Lumen Technologies researchers reported that the J-magic campaign targets Juniper routers with a custom backdoor using a passive agent based on the cd00r variant (an open-source backdoor by fx ).

article thumbnail

The top 10 brands exploited in phishing attacks - and how to protect yourself

Collaboration 2.0

Impersonating a well-known brand is an easy way for scammers to get people to click their malicious links. Here's what to watch for.

Phishing 336
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds SonicWall SMA1000 flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SMA1000 vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) vulnerability, tracked as CVE-2025-23006 to its Known Exploited Vulnerabilities (KEV) catalog.

IT 242
article thumbnail

OpenAI's new ChatGPT agent can perform interactive tasks on your behalf

Collaboration 2.0

The new Operator tool is available only to ChatGPT Pro subscribers, for now.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild

Security Affairs

SonicWall warns customers of a critical zero-day vulnerability in SMA 1000 Series appliances, likely exploited in the wild. SonicWall is waring customers of a critical security vulnerability, tracked as CVE-2025-23006 (CVSS score of 9,8) impacting its Secure Mobile Access (SMA) 1000 Series appliances. The vulnerability is a Pre-authentication deserialization of untrusted data issue in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) that has been likely exploit

More Trending

article thumbnail

Don't Get Schooled: Lessons From PowerSchool's Big Breach

Data Breach Today

Why MFA and Data Minimization Remain Key for Preventing Massive Data Breaches While PowerSchool's investigation into the massive theft of its customers' data is continuing, clear lessons have already emerged. Count among them the importance of using multifactor authentication, which could have safeguarded access to PowerSchool's exploited customer support systems.

article thumbnail

TikTok creators can earn big cash bonuses by posting on Facebook and Instagram

Collaboration 2.0

Creators are in limbo due to TikTok's ongoing legal uncertainties. Here are the incentives Meta is using to snare influencers.

278
278
article thumbnail

Information Security Career Advice: 'Pick Your Battles'

Data Breach Today

With the pace of global change so often creating a sense of accelerating chaos, it's easy to view cyber defenders as firefighters constantly on call. But Black Hat conference founder and creator Jeff Moss warned that "things have been on fire for as long as I can remember.

article thumbnail

This MagSafe charger that looks like a macaron is my new favorite travel accessory

Collaboration 2.0

Anker's MagGo 3-1 wireless charger is an ultraportable device that's dethroned even my favorite travel charger -- and it's 24% off.

IT 273
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Patching Lags for Vulnerabilities Targeted by Salt Typhoon

Data Breach Today

Chinese Hackers Hitting Unpatched Products From Microsoft, Sophos, Fortinet, Ivanti Chinese nation-state hackers who surreptitiously gained "broad and full" access to telecommunications networks in the U.S. and dozens of other countries have regularly exploited known flaws in their networking gear that the victims failed to patch, security experts have warned.

Access 147
article thumbnail

Microsoft is changing the way you sign in - and it could be a security nightmare

Collaboration 2.0

Starting next month, if you don't want the browser to remember your Microsoft login credentials, you'll have to manually log out or open the page in private browsing mode. Here's why.

IT 264
article thumbnail

OpenAI Launches AI Agent 'Operator'

Data Breach Today

Operator Cannot Yet Reliably Perform Complex, Customized Tasks OpenAI introduced an AI agent capable of independent action with the launch of Operator, an general-purpose AI tool that interacts with websites to perform tasks. The agent can navigate menus and complete forms to do tasks such as travel booking, ordering takeout, buying stuff or scheduling tasks.

147
147
article thumbnail

Should you buy a cheap robot vacuum? This $400 model proves it might even be a great idea

Collaboration 2.0

The Eureka E20 Plus is a self-emptying robot vacuum that offers great value for the money, even if it omits some popular features.

IT 264
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Digitize supply chains to get ahead of possible disruptions

OpenText Information Management

Economists predict businesses will have little choice but to pass the cost of proposed tariffs on to customers for anything from clothing, food, automobiles, energy, and more. Enterprise businesses may be able to absorb some of tariff-related costs to limit their impact, but small to mid-sized businesses risk losing customers altogether if prices spike too high too fast even despite easing inflation.

B2B 59
article thumbnail

I tested this $2,000 AI-powered video bar at work - and it spoiled all my coworkers

Collaboration 2.0

The Insta360 Connect elevates the conference room with solid hardware and AI-powered speaker tracking.

IT 264
article thumbnail

Energy insights from Davos 2025 – safeguarding the planet

OpenText Information Management

As global leaders converge at Davos for the World Economic Forum 2025, safeguarding our planet is one of five key themes in this years forum. The theme explores, how can we catalyze energy, climate and nature action through innovative partnerships, increased financing and the deployment of frontier technologies. I see this theme very much encompassing the information management software technology domain as one of those frontier technology areas.

article thumbnail

My favorite Kindle accessory seriously upgraded my reading experience (and it only costs $20)

Collaboration 2.0

Strapsicle's silicone straps secure my Kindle Paperwhite and give me the perfect grip for comfortable reading, and they don't break the bank.

IT 251
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Why AI in Healthcare Harkens Back to Early Social Media Use

Data Breach Today

While AI platforms and tools promise to offer encouraging potential in healthcare, many are unprepared to deal with the risks these emerging technologies pose - similar to the early days of social media, said Keith Fricke, co-managing partner and principal consultant at tw-Security.

Risk 130
article thumbnail

This 4K projector delivers an immersive viewing experience that can replace my TV

Collaboration 2.0

Jmgo's N1S Ultimate 4K projector is an expensive flagship model that can project a massive 180-inch screen - as long as you have the wall space.

246
246
article thumbnail

Why AI in Healthcare Harkens Back to Early Social Media Use

Data Breach Today

While artificial intelligence platforms and tools promise to offer encouraging potential in healthcare, many are unprepared to deal with the risks these emerging technologies pose - similar to the early days of social media, said Keith Fricke, partner and principal of tw-Security.

article thumbnail

How I gave my AirTag 10 more years of battery life with this cheap accessory

Collaboration 2.0

I have over a dozen AirTags in use, and my biggest problem is having to change the batteries every year or so. No more!

246
246
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Curbing the Rise in Investment Scams

Data Breach Today

Fraud Expert Ken Westbrook on Successful Ways to Stop Fake Investment Sites According to the FBI, losses from investment scams surged 38% between 2022 and 2023. Fraudsters are using highly effective tactics, including sending text messages to lure victims to fake cryptocurrency platforms, said Ken Westbrook, founder and CEO of Stop Scams Alliance.

130
130
article thumbnail

Roll over, Darwin: How Google DeepMind's 'mind evolution' could enhance AI thinking

Collaboration 2.0

This new approach, based on natural selection, dramatically improves the reliability of large language models for practical tasks like trip planning. Here's how it works.

IT 244
article thumbnail

Post-Quantum Cryptography 2025: The Enterprise Readiness Gap

Data Breach Today

Enterprises Prepare for Quantum-Resilient Infrastructures to Combat Future Threats Many enterprises understand the potential risks of quantum computing. But few have begun actively planning or implementing post-quantum cryptography. The NIST PQC standardization process provides enterprises with guidance on adopting quantum-resistant algorithms, said David Close of Futurex.

Risk 130
article thumbnail

I tried Perplexity's assistant, and only one thing stops it from being my default phone AI

Collaboration 2.0

There's a new option to replace your Google Assistant, and it does almost everything right.

IT 243
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A new era of connection at OpenText

OpenText Information Management

Over the last few decades OpenText has been the leader in information management software. Along the way weve acquired many companies and brands that have expanded our mission and purpose to accelerate how information management can elevate us all to be our best. Over time, our product names have become more varied and less reflective of our advancements in cloud, security, and AI as the next innovation frontiers of information management.

Cloud 59
article thumbnail

The first Android 16 beta is available to download now - here's what's new

Collaboration 2.0

The public beta for the next big Android version is out now. Read this before you download it.

IT 235
article thumbnail

Phishing is the Top Security Threat For Smartphone Users

KnowBe4

Phishing attacks are the most common security issue for smartphone users, according to a new study by Omdia.

Phishing 119